# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac549cdf299709587fe94a0abc2f12fd0654839034626e95f283bde6e2f4ab19
Pseudo Output
cc4ff7672c113d633637adc4bc7799e2ad7aed1b62351bd368d22dbc73181a59
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
50c11df3b939a96b0e995e0035c291535df9068a6daee2959c7873bd5b6af13c
Commitment
94e8fcc0d382914b4f4f3e69cb2d3834d232aabfb567fbb5cd0d9cacfbb8f551
Range Proof
672 bytes (Bulletproof)
Memo
de699258afcad1ffcc06f9d847c8caded754dd461aa7e28276d1011122c5dc038f8e177c5dc6c6b1e41281ed6b8897b21ff19ced9b74705ef19aa4af2fcf46598730159fb864466f8b4a7c692c3cb459dbd9c7df2d0f3ccf1bd2a02d4533dba711b5917836a1f34c276cf7b9983f29fa4ce174117a50331519f33cc6eb3ffae2 (encrypted)
Stealth Address
26e390166707c689bec29b8e0a055875b34d0a796feab58d55795d13ff7ddf49
Commitment
38186dec9ba09c2e7dbd51fa55d4b4a644fb9ce0ffb23302d51cd91f76990900
Range Proof
672 bytes (Bulletproof)
Memo
8a3ad28bbbbb3a11fd44f741ec544e46f98a902a9fba25b60cea9dbe0f15e682aebf97874085b46ac87c135278379e150bc67d2f26520cb033ec74bc0780c337089787e25ac18f383db7cfa13a0e09554737894d46f19f107c8adaa0592e433a8bad29d50068f3e2b10d7274d21989b4313c6b92a7c95897ba642d2e3b68fbb9 (encrypted)